General

  • Target

    250205-2d2x9atrbs_pw_infected.zip

  • Size

    1.9MB

  • Sample

    250205-2gstratrgw

  • MD5

    9117e4286adec9455ab09d350375989f

  • SHA1

    e355d467eeb9d5d5b9cf59aee7421c7ae8bdb306

  • SHA256

    0ce392328843e7bcae98d1f5b4119f756f04e37d23d51f4af257d19915924264

  • SHA512

    360794e9831ab6f537e09846ae79eda4f4587dacc9248b16d3443c6b075c5d724cdd47a849bbbea2fe2c12183658328bae40c5cf3e144161461edf0d166dbb3f

  • SSDEEP

    49152:Vk8cieu3U7iWZ3wKNA6vuLTWd5v+iOucMxM:Vk/mU7iWZk3L6dD9xM

Malware Config

Extracted

Family

tofsee

C2

43.231.4.7

lazystax.ru

Targets

    • Target

      2025-02-05_9cc55c14f3f8b827be600f06294a28ae_mafia

    • Size

      12.1MB

    • MD5

      9cc55c14f3f8b827be600f06294a28ae

    • SHA1

      95cac66b7d32e4bbac545b42ab0b4a1e3d5bf0b6

    • SHA256

      7f4bf16cfb9771a3158632ca4deb1af275cdb5b52c807f6bfa5176f9cfaf2475

    • SHA512

      e0fef214e744710204e3e9897d83cdde34bc70953726975e6223b49ffa8638e66ebe48b7082d9d82b4f6b5972cbc49824f575fac89f1a4b7e88b451cab4382bd

    • SSDEEP

      49152:pLFuiE888888888888888888888888888888888888888888888888888888888x:pLMQ

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks